Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2025, 14:43
Static task
static1
Behavioral task
behavioral1
Sample
cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe
Resource
win7-20241023-en
General
-
Target
cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe
-
Size
96KB
-
MD5
dc13ac1eb0bcdc4664e868bfa5286890
-
SHA1
bde56c417416dbb298ec42e03f71cad3dff0fec0
-
SHA256
cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25dd
-
SHA512
b6557b334c9186aef75b091ef313eac20da106adf74fa67e66f6a35e84d74cfc40e42aefb0f284590da012e72be6847d8d4fcc6944c740e0f9205468180b6248
-
SSDEEP
1536:InAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:IGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1864 omsecor.exe 3180 omsecor.exe 628 omsecor.exe 5016 omsecor.exe 2240 omsecor.exe 4716 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1880 set thread context of 3452 1880 cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe 85 PID 1864 set thread context of 3180 1864 omsecor.exe 91 PID 628 set thread context of 5016 628 omsecor.exe 109 PID 2240 set thread context of 4716 2240 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 1700 1880 WerFault.exe 83 2356 1864 WerFault.exe 87 3536 628 WerFault.exe 108 2256 2240 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1880 wrote to memory of 3452 1880 cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe 85 PID 1880 wrote to memory of 3452 1880 cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe 85 PID 1880 wrote to memory of 3452 1880 cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe 85 PID 1880 wrote to memory of 3452 1880 cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe 85 PID 1880 wrote to memory of 3452 1880 cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe 85 PID 3452 wrote to memory of 1864 3452 cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe 87 PID 3452 wrote to memory of 1864 3452 cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe 87 PID 3452 wrote to memory of 1864 3452 cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe 87 PID 1864 wrote to memory of 3180 1864 omsecor.exe 91 PID 1864 wrote to memory of 3180 1864 omsecor.exe 91 PID 1864 wrote to memory of 3180 1864 omsecor.exe 91 PID 1864 wrote to memory of 3180 1864 omsecor.exe 91 PID 1864 wrote to memory of 3180 1864 omsecor.exe 91 PID 3180 wrote to memory of 628 3180 omsecor.exe 108 PID 3180 wrote to memory of 628 3180 omsecor.exe 108 PID 3180 wrote to memory of 628 3180 omsecor.exe 108 PID 628 wrote to memory of 5016 628 omsecor.exe 109 PID 628 wrote to memory of 5016 628 omsecor.exe 109 PID 628 wrote to memory of 5016 628 omsecor.exe 109 PID 628 wrote to memory of 5016 628 omsecor.exe 109 PID 628 wrote to memory of 5016 628 omsecor.exe 109 PID 5016 wrote to memory of 2240 5016 omsecor.exe 111 PID 5016 wrote to memory of 2240 5016 omsecor.exe 111 PID 5016 wrote to memory of 2240 5016 omsecor.exe 111 PID 2240 wrote to memory of 4716 2240 omsecor.exe 113 PID 2240 wrote to memory of 4716 2240 omsecor.exe 113 PID 2240 wrote to memory of 4716 2240 omsecor.exe 113 PID 2240 wrote to memory of 4716 2240 omsecor.exe 113 PID 2240 wrote to memory of 4716 2240 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe"C:\Users\Admin\AppData\Local\Temp\cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exeC:\Users\Admin\AppData\Local\Temp\cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 2688⤵
- Program crash
PID:2256
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 2926⤵
- Program crash
PID:3536
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 2884⤵
- Program crash
PID:2356
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 3002⤵
- Program crash
PID:1700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1880 -ip 18801⤵PID:468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1864 -ip 18641⤵PID:3992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 628 -ip 6281⤵PID:2368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2240 -ip 22401⤵PID:4712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD55e29cf06b9a4e1bc9e59e5c257fc7124
SHA1cec058af7b519cf731f95b4d688c66801ad89379
SHA2562bf907e688b18b4dbfda20258d23fa0b9cfcc3eb1c082d8054348be3b1f2c506
SHA5121e316f854d027c3f9067b3f6356386da8e6b377bc9650f8c037fb9b800b97b0019edab1763641743754772d33d8020efe413407bc8e10872c9bab1924e516c4e
-
Filesize
96KB
MD58362b05a1d1269f5706e261b5d82b3a5
SHA1fd10f4492e66f099eedba60680dea87bae8812ce
SHA256b306c43204d9539c4ec8c1beac0e2c70dc258a3cefc1fd33ff212cae7c3bdb27
SHA5124d15a99df34f13ec8083edb6e2688ac4ee8189bc83c63e20b8869522cb1c7ad8e19376a7867f8d76826a3bc07435403689b5696079b3132924439cd6d1c1f6d3
-
Filesize
96KB
MD59a6f27cc4fcafa6ca4a89244def90034
SHA1ebd54aaf13943a003b492d56f1952bec74eae154
SHA256c52fe80abfc286450361b4c8783d10ca29a36262c9d18709d801ba321822e285
SHA5120c5470ae55aa452fc12442c625d67a12e606ccfe89aba0437578cbefff616ca42716a718b6e9efd22310251120c990ac4275cf1107838c08d4f9944d1cb4e239